Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

14 May 2026
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

14 May 2026
Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

14 May 2026
Your iPhone Gets Stolen. Then the Hacking Begins

Your iPhone Gets Stolen. Then the Hacking Begins

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Tech News

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

By technologistmag.com3 March 20264 Mins Read
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Share
Facebook Twitter Reddit Telegram Pinterest Email

Google notes that Apple patched vulnerabilities used by Coruna in the latest versions of its mobile operating system, iOS 26, so its exploitation techniques are only confirmed to work against iOS 13 through 17.2.1. It targets vulnerabilities in Apple’s Webkit framework for browsers, so Safari users on those older versions of iOS would be vulnerable, but there’s no confirmed techniques in the toolkit for targeting Chrome users. Google also notes that Coruna checks if an iOS devices has Apple’s most stringent security setting, known as Lockdown Mode, enabled, and doesn’t attempt to hack it if so.

Despite those limitations, iVerify says Coruna likely infected tens of thousands of phones. The company consulted with a partner that has access to network traffic and counted visits to a command-and-control server for the cybercriminal version of Coruna infecting Chinese-language websites. The volume of those connections suggest, iVerify says, that roughly 42,000devices may have already been hacked with the toolkit in the for-profit campaign alone.

Just how many other victims Coruna may have hit, including Ukrainians who visited websites infected with the code by the suspected Russian espionage operation, remains unclear. Google declined to comment beyond its published report. Apple did not immediately provide comment on Google or iVerify’s findings.

In iVerify’s analysis of the cybercriminal version of Coruna—it didn’t have access to any of the earlier versions—the company found that the code appeared to have been altered to plant malware on target devices designed to drain cryptocurrency from crypto wallets as well as steal photos and, in some cases, emails. Those additions, however, were “poorly written” compared to the underlying Coruna toolkit, according to iVerify chief product officer Spencer Parker, which he found to be impressively polished and modular.

“My god, these things are very professionally written,” Parker says of the exploits included in Coruna, suggesting that the cruder malware was added by the cybercriminals who later obtained that code.

As for the clues that suggest Coruna’s origins as a US government toolkit, iVerify’s Cole notes that it’s possible that Coruna’s code overlap with the Operation Triangulation code that Russia pinned on US hackers could be based on Triangulation’s components being picked up and repurposed after they were discovered. But Cole argues that’s unlikely. Many components of Coruna have never been seen before, he points out, and the whole toolkit appears to have been created by a “single author,” as he puts it.

“The framework holds together very well,” says Cole, who previously worked at the NSA, but notes that he’s been out of the government for more than a decade and isn’t basing any findings on his own outdated knowledge of US hacking tools. “It looks like it was written as a whole. It doesn’t look like it was pieced together.”

If Coruna is, in fact, a US hacking toolkit gone rogue, just how it got into foreign and criminal hands remains a mystery. But Cole points to the industry of brokers that may pay tens of millions of dollars for zero-day hacking techniques that they can resell for espionage, cybercrime, or cyberwar. Notably, Peter Williams, an executive of US government contractor Trenchant, was sentenced this month to seven years in prison for selling hacking tools to the Russian zero-day broker Operation Zero from 2022 to 2025. Williams’ sentencing memo notes that Trenchant sold hacking tools to the US intelligence community as well as others in the “Five Eyes” group of English-speaking governments—the US, UK, Australia, Canada and New Zealand—though it’s not clear what specific tools he sold or what devices they targeted.

“These zero-day and exploit brokers tend to be unscrupulous,” says Cole. “They sell to the highest bidder and they double dip. Many don’t have exclusivity arrangements. That’s very likely what happened here.”

“One of these tools ended up in the hands of a non-Western exploit broker, and they sold it to whoever was willing to pay,” Cole concludes. “The genie is out of the bottle.”

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleApple’s new Studio Display XDR shrinks Pro XDR into a brighter, more affordable miniLED monitor
Next Article Marathon: Bungie Reveals New Seasons, Runner Shells, Maps, And More Will Be Free Alongside Season 1 Details

Related Articles

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

14 May 2026
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

14 May 2026
Your iPhone Gets Stolen. Then the Hacking Begins

Your iPhone Gets Stolen. Then the Hacking Begins

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Review: Klipsch the Fives II

Review: Klipsch the Fives II

14 May 2026
Meta is testing an AI bot to unleash the same online stupidity that is AskGrok on X

Meta is testing an AI bot to unleash the same online stupidity that is AskGrok on X

14 May 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

By technologistmag.com14 May 2026

It seems that Microsoft is keeping up its promise of making Windows 11 better. After…

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

14 May 2026
Your iPhone Gets Stolen. Then the Hacking Begins

Your iPhone Gets Stolen. Then the Hacking Begins

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Kylie Jenner Calls The Legend Of Zelda: Breath Of The Wild ‘One Of The Best Games Ever’

Kylie Jenner Calls The Legend Of Zelda: Breath Of The Wild ‘One Of The Best Games Ever’

14 May 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.